Resources and content to help you monitor and combat defence grade cyber attacks
Access our industry-leading resources to improve your cyber resilience: case studies, compliance guides, white papers plus educational tools and videos.
Use the filter options below to quickly access the information you require.
Case Studies
Developing Managed Security Services
How two organisations developed and grew their managed security services....
Case Studies
Improving Security Control Effectiveness
How an organisation that provides IT services to 9 organisations gained a centralised view of security control effectiveness....
Case Studies
Credit Union Case Study
Explore why this this credit union chose Huntsman technology to meet its compliance obligations to PCI-DSS, ISO 27001 and APRA...
Case Studies
Managed Investment Services Case Study
Explore why this investment management services company to some of Australia’s leading life insurers, superannuation providers...
Case Studies
Retail Bank Case Study
How an Australian arm of an international bank used Huntsman to consolidate the security of disparate IT and security systems....
Compliance Guides
APRA CPS 234 Compliance Guide
A guide to how Huntsman Security technology supports compliance to APRA CPS 234 July 2019....
Compliance Guides
ASD ISM Compliance Guide
ASD ISM June 2020 - a step by step guide detailing how Huntsman Security technology maps to the requirements....
Compliance Guides
Australian Energy Sector Cyber Security Framework Compliance Guide
Discover how to align with the Australian Energy Sector Cyber Security Framework's security profiles....
Compliance Guides
CMMC Compliance Guide Overview
Discover how to fulfil over 80% of CMMC compliance requirements....
Compliance Guides
Cyber Essentials Compliance Guide
Discover how to continuously measure compliance to the five Cyber Essentials controls....
Compliance Guides
Essential 8 Risk & Compliance Guide
A guide to how Huntsman Security technology measures your compliance and alignment to the Essential 8 security controls....
Compliance Guides
ASD ISM System Monitoring Compliance Guide
The latest December 2019 ASD ISM System Monitoring recommendations: learn how Huntsman Security technology maps to the...
Compliance Guides
Fast Track your GDPR Compliance
Are you fulfilling your GDPR obligations? Download the guide for practical examples on what implementing GDPR should look like....
Compliance Guides
GDPR Security Monitoring Summary
An overview of GDPR cyber security compliance obligations....
Compliance Guides
GDPR Security Monitoring Reference Guide
Review the 5 key GDPR articles that apply to security monitoring and access our guidance detailing how to comply....
Compliance Guides
GPG13 Compliance Guide OVERVIEW
An overview of how Huntsman SIEM can help your organisation meet its GPG13 obligations and similar protective monitoring...
Compliance Guides
ISO27001 Compliance Guide
A guide detailing how Huntsman Security technology supports the latest ISO 27001 requirements...
Compliance Guides
PCI DSS Compliance Guide OVERVIEW
An overview of how Huntsman Enterprise SIEM supports PCI DSS compliance, meeting the challenges without leaving security gaps....
Compliance Guides
PCI DSS Compliance Guide
A step by step Compliance Guide detailing how Huntsman Enterprise SIEM supports PCI DSS regulations, meeting the challenges...
Compliance Guides
PSD2 Compliance Guide Overview
This paper gives an overview of The Payment Services Directive 2 (PSD2), the updated version of the original Payment Services...
Compliance Guides
PSD2 Compliance Guide
Discover what the legislation means, the cyber security requirements and how Huntsman Security technology maps to the standard....
Compliance Guides
FISMA Compliance Guide Overview
An overview of how to support FISMA requirements with Huntsman®: the hub of a security ecosystem to monitor the audit,...
Compliance Guides
FISMA Compliance Guide
A detailed Compliance Guide showing how Huntsman® supports FISMA requirements; providing the hub of a security ecosystem to...
Infographics
Business Value of Monitoring
Check out the Business Value of Monitoring Infographic... do you know the value Cyber Security Monitoring adds to your business?...
Infographics
Supply Chain Risk Infographic
This infographic gives a simple visualisation of Supply Chain Risk Management...
Infographics
PSD2 Operational Risk & Security Guidelines
This infographic gives a simple visualisation of PSD2 Operational Risk & Security Guidelines....
Infographics
Security Incident Handling (Threat Overload)
Security Incident Handling to avoid Threat Overload.... check out the infographic....
Product Brochures
Essential 8 Auditor
An audit tool that delivers an immediate, exportable view of security control effectiveness....
Product Brochures
Essential 8 Scorecard
A risk management tool that continuously measures the effectiveness of your security controls....
Product Brochures
Next Gen SIEM
A next generation SIEM, with inbuilt behavioural anomaly detection and threat intelligence....
Product Brochures
Next Gen SIEM MSSP
Next Gen SIEM MSSP, with multi-tenancy to reduce service delivery costs, simplify security management and accelerate revenue...
Product Brochures
Next Gen SIEM Cloud
Next Gen SIEM Cloud provides security monitoring for your cloud service infrastructure and as a value-added security monitoring...
Product Brochures
Next Gen SIEM SOAR
Security Automation that verifies threats and reduces False Positives, freeing analysts to focus on real threats....
Product Brochures
Behaviour Anomaly Detection
Explore how Huntsman uses machine-based learning to deliver behavioural profiling and detection of threats not identified by...
Product Brochures
Huntsman Multi Tenancy
Discover how Huntsman’s Multi-Tenancy allows security service providers to separate customer data and reporting, and segregate...
Product Brochures
Forrester Wave 2018 Report
Explore Forrester Research's review of Huntsman Security's Next Gen SIEM & Security Analytics technology....
Product Brochures
Huntsman Threat Intelligence
Explore how Huntsman Threat Intelligence sources cyber security intelligence and event context automatically, and in real-time....
Product Brochures
Huntsman Extended Data Repository
Huntsman Extended Data Repository provides access to longer-term data across multiple, parallel distributed repositories whilst...
Product Brochures
Huntsman High Availability Licence Pack
Huntsman High Availability provides the capabilities to deliver, true active-active or active-passive resilience and effective...
Solution Briefs
Cloud Security using Huntsman
How to use Huntsman to secure Cloud Platforms: Real-time, multi tenant, intelligent monitoring and event processing....
Solution Briefs
MSSP Security using Huntsman
Discover how to scale your security services by using Huntsman SIEM technology to manage multiple customers on a single...
Solution Briefs
Threat Intelligence using Huntsman
How to use Huntsman Security's Next Gen SIEM to leverage Threat Intelligence, to improve situational awareness and threat...
Tools
5 Ways to Improve Security Audits
How to easily collect data, assess performance and accurately report on IT security controls...
Tools
Essential Guide to SIEM
How next generation SIEM works and its role in providing SOC teams with insights and a track record of activities....
Tools
4 Steps to Visible Cyber Hygiene
Minimise security breach fines under GDPR and other international privacy legislation....
Tools
MSP Guide to Building Cyber Security Services
An overview to establishing and growing your cyber security services....
Tools
A Guide to Cyber Security KPIs
An overview of defining, setting and monitoring KPIs for cyber security....
Tools
Personal Data Breach Mitigation - 4 Step Checklist
Preventative strategies to minimise the number of data breaches including practical examples....
Tools
Essential Guide to Data Breach Notifications
One of the most hotly talked about requirements of GDPR is the need to notify the authority within 72 hours of a confirmed breach....
Tools
Cloud Security Service Options for Cloud Service Providers
An introduction to cloud security service options....
Tools
Essential Guide to Cyber Security NCSC 10 Steps
Implement the UK's NCSC 10 Steps to Cyber Security with our helpful, structured, progressive plan....
Tools
5 Best Practice ISMS Checklists
Benchmark your current ISMS...against our 5 Best Practice ISMS Checklists....
Tools
5 Step Cyber Security Benchmark Tool
Measure your organisation's cyber posture with our 5 Step Cyber Security Benchmark Tool....
Video / Webinar
Cyber Security Audit Solutions for Consultancies
Request the demo links and discover how you can manage a cyber audit remotely...
Video / Webinar
Security Scorecard Overview
See how the Essential 8 Scorecard measures security control effectiveness...
Video / Webinar
Essential 8 Auditor Overview
Gain an immediate, systematic view of security control effectiveness....
Video / Webinar
Business Intelligence Reporting overview
See how a strong business intelligence interface can support your stakeholders...
Video / Webinar
Cyber Risk Measurement – Executive Visibility
See how the Essential 8 Scorecard provides cyber KPIs for managing cyber risk...
Video / Webinar
BAD Short Video
Behaviour Anomaly Detection lets you see unknown threats in real-time...
Video / Webinar
Next Gen SIEM SOAR short video
Eliminate False Positives and shorten the time from threat detection to resolution...
Video / Webinar
Cyber Security Incidents and Attacks
This video explains how cyber attacks vary by geography and industry. In just 8 minutes discover the costs of attacks and the...
Video / Webinar
Protective Monitoring
Protective Monitoring...learn why it's important and how to apply it in your organisation....
White Papers
Cyber security audit challenges in 2020
Discover the ISACA member participant views on the challenges and how their businesses are responding....
White Papers
Cyber Security Predictions 2021
Looking forward to the next year in cyber security: insight into how 2021 will impact your organisation's risk exposure....
White Papers
Cyber Security Predictions 2020
Looking forward to the next year in cyber security: gain insight into how 2020 may impact your organisation's risk exposure....
White Papers
Analytics and Automation in Cyber Security
Alert volumes are increasing every year. Explore how automation can help reduce routine tasks and identify real threats for your...
White Papers
ACSC Essential 8 Security Controls: The Ninth Step
Discover the critical ninth step to maximise the visibility and measurement of the Essential 8, including vital links to official...
White Papers
Cloud Security - Monitoring to the ASD Essential Eight
Learn how integrating a SIEM platform with a cloud service can help your organisation unmask threats and provide a full security...
White Papers
GDPR - What the new Data Protection Regulations mean to UK Businesses
Explore the conditions that indicate if GDPR applies to your business and your commitment once a breach is detected....
White Papers
GDPR - What the New Regulations mean in Australia
Explore how the conditions of GDPR affect Australian business....
White Papers
Information Monitoring in Criminal Justice
Protecting information assets in the Criminal Justice space is key to upholding the system. Explore further....
White Papers
Information Monitoring in Government
Information monitoring in government is a challenge, the public's trust is only as good as the last headline....
White Papers
Insider Threats: Why behaviour is key to early detection
Insider Threats is one of the greatest security risks to your organisation's information assets. Read more....
White Papers
MITRE ATT&CK Matrix
Discover what the framework is, who it supports and how you can start to build a resilient baseline of security...
White Papers
Scorecard Overview
Explore just eight cyber controls to protect your business, how to get clear visibility of your cyber security posture and the...
White Papers
The Cyber Security Malware Crisis is Deepening
Explore the scale of cyber threats businesses face and the technology, people and process aspect of the challenge....
White Papers
The Internet Of Things
The Internet of Things (IoT) is a challenge for all of us, at home and in the workplace. Explore the security implications....
White Papers
Top Cyber Mitigation Strategies
Key Governments' cyber mitigation recommendations to defend your business from cyber attacks....
White Papers
Fraud Prevention & IT Security
How SIEM technology can monitor and prevent cyber fraud, and protect your organisation's information assets....